diff options
author | remko <remko@FreeBSD.org> | 2005-04-16 22:35:09 +0000 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-04-16 22:35:09 +0000 |
commit | 587e77e9368cb5cc5701619592f7a19ca42b3c76 (patch) | |
tree | aa7a51f1224b4b8a01a638ba0dce71d72a8c5c28 /security | |
parent | 0d2e42c8e0f0c1c3f3afd4d4fb78a0b6a561c0ac (diff) | |
download | FreeBSD-ports-587e77e9368cb5cc5701619592f7a19ca42b3c76.zip FreeBSD-ports-587e77e9368cb5cc5701619592f7a19ca42b3c76.tar.gz |
Document jdk - jar directory traversal vulnerability.
Approved by: simon
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index be92933..f531918 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,61 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="18e5428f-ae7c-11d9-837d-000e0c2e438a"> + <topic>jdk -- jar directory traversal vulnerability</topic> + <affects> + <package> + <name>jdk</name> + <range><le>1.4.2p8</le></range> + <range><ge>1.5.*</ge><le>1.5.0p1_1</le></range> + </package> + <package> + <name>linux-ibm-jdk</name> + <range><le>1.4.2_1</le></range> + </package> + <package> + <name>linux-sun-jdk</name> + <range><le>1.4.2.08_1</le></range> + <range><ge>1.5.*</ge><le>1.5.2.02,2</le></range> + </package> + <package> + <name>linux-blackdown-jdk</name> + <range><le>1.4.2_2</le></range> + </package> + <package> + <name>diablo-jdk</name> + <range><le>1.3.1.0_1</le></range> + </package> + <package> + <name>linux-jdk</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Pluf has discovered a vulnerability in Sun Java JDK/SDK, + which potentially can be exploited by malicious people to + compromise a user's system.</p> + <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=111331593310508"> + <p>The jar tool does not check properly if the files to be + extracted have the string "../" on its names, so it's + possible for an attacker to create a malicious jar file in + order to overwrite arbitrary files within the filesystem.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-1080</cvename> + <mlist msgid="200504120226.10559.pluf@7a69ezine.org">http://marc.theaimsgroup.com/?l=bugtraq&m=111331593310508</mlist> + <url>http://www.securiteam.com/securitynews/5IP0C0AFGW.html</url> + <url>http://secunia.com/advisories/14902/</url> + </references> + <dates> + <discovery>2005-04-11</discovery> + <entry>2005-04-16</entry> + </dates> + </vuln> + <vuln vid="f650d5b8-ae62-11d9-a788-0001020eed82"> <topic>mozilla -- privilege escalation via DOM property overrides</topic> <affects> |